Enterprise Leadership

SEARCH

CATEGORIES

TAGS

    My Endpoint Detection and Response (EDR) Should Have Caught That!

    April 6, 2022
    It isn’t enough to have to have the security solution. A medical clinic with over 120 providers used best-in-class endpoint detection and response (EDR) software. Nevertheless, NodeZero quickly identified a device’s Local Security Authority Subsystem Service Process (LSASS), dump and cracked user credentials, moved laterally, and gained Windows Domain Administrator privileges. The result: full domain…
    My EDR Should Have Caught That!

    SANS Webcast w/ Sponsor Horizon3.ai

    Many penetration tests are only point-in-time and/or manual. In this Horizon3.ai sponsored webcast from SANS, take a First Look at how Horizon3.ai’s NodeZero takes on the pen test problem.  Listen to SANS Senior Instructor Dave Shackleford and Horizon3.ai’s CEO and Co-Founder Snehal Antani discuss the platform’s highlights and why it might be right for your…

    NYIS Meetup Panel, “How do you know it’s fixed?”

    David Raviv, host of NYIS Meetup, Snehal Antani, CEO and Co-founder of Horizon3, Steve Ramey of Arete Advisors LLC, and Mark Rasch, computer security and privacy expert, lawyer, author, and commentator, met for a panel discussion over 'How do you know it's fixed?' Learn about: - Employing a defense strategy w/ multiple layers - Identifying…

    Defense in Depth

    February 19, 2022
    Defense in depth is a proven strategy for protecting systems and software from insider and external attacks.
    Defense in Depth Whitepaper

    NYIS Fireside Chat with David Raviv

    On January 28, 2022, CEO and Co-founder Snehal Antani sat down with host David Raviv of NY Information Security Meetup for an insightful fireside chat. They discussed Snehal's career as former CTO of Splunk and JSOC, his inspiration for starting Horizon3, and his outlook on the future of cyber warfare. Learn about: - Employing a…

    Credential Misconfigurations

    October 25, 2021
    Are your credential policies implemented right? Are your enterprise accounts configured correctly? How do you know? Most phishing, ransomware, and credential attacks start by gaining access to a host and compromising a domain user (Credential Attacks – Horizon3.ai). With a credential in hand, an attacker can persist and pervade, appearing like a legitimate user and…
    Credential Misconfigurations - Abstract cubes that don't fit together properly.

    Vulnerable ≠ Exploitable

    September 19, 2021
    The hardest part of cyber security is deciding what NOT to do. Being vulnerable doesn’t mean you’re exploitable.

    The Password Pandemic

    September 10, 2021
    Credential attacks bypass traditional defenses and cause billions in damage. Learn why they work, what’s at risk, and how Horizon3.ai helps fix what matters.

    Compliance In Security: Go from Compliant to Secure

    August 17, 2021
    Learn why regulatory compliance is not enough for true cybersecurity. Discover how continuous automated pentesting and network segmentation help you move beyond check-the-box security.